diff options
author | Andre Oppermann <andre@FreeBSD.org> | 2007-03-21 18:05:54 +0000 |
---|---|---|
committer | Andre Oppermann <andre@FreeBSD.org> | 2007-03-21 18:05:54 +0000 |
commit | e406f5a1c92bd2b9c849c3b7004bfb61e9471552 (patch) | |
tree | a000d55d110721e45de1d87bbc0dd4551a416554 /sys/netinet/tcp_var.h | |
parent | 9ac793831b9a8cbd1d3791b089978da1629bf740 (diff) | |
download | src-e406f5a1c92bd2b9c849c3b7004bfb61e9471552.tar.gz src-e406f5a1c92bd2b9c849c3b7004bfb61e9471552.zip |
Remove tcp_minmssoverload DoS detection logic. The problem it tried to
protect us from wasn't really there and it only bloats the code. Should
the problem surface in the future we can simply resurrect it from cvs
history.
Notes
Notes:
svn path=/head/; revision=167772
Diffstat (limited to 'sys/netinet/tcp_var.h')
-rw-r--r-- | sys/netinet/tcp_var.h | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/sys/netinet/tcp_var.h b/sys/netinet/tcp_var.h index 6dc20d4e26ce..07704128dc35 100644 --- a/sys/netinet/tcp_var.h +++ b/sys/netinet/tcp_var.h @@ -186,10 +186,6 @@ struct tcpcb { tcp_seq snd_recover_prev; /* snd_recover prior to retransmit */ u_long t_badrxtwin; /* window for retransmit recovery */ u_char snd_limited; /* segments limited transmitted */ -/* anti DoS counters */ - u_long rcv_second; /* start of interval second */ - u_long rcv_pps; /* received packets per second */ - u_long rcv_byps; /* received bytes per second */ /* SACK related state */ int sack_enable; /* enable SACK for this connection */ int snd_numholes; /* number of holes seen by sender */ @@ -493,7 +489,6 @@ extern struct inpcbinfo tcbinfo; extern struct tcpstat tcpstat; /* tcp statistics */ extern int tcp_mssdflt; /* XXX */ extern int tcp_minmss; -extern int tcp_minmssoverload; extern int tcp_delack_enabled; extern int tcp_do_newreno; extern int path_mtu_discovery; |